The Key to Better Security

Many of us have replaced keyed door locks with electronic locks that use codes to unlock doors. They emulate the PIN technology we use to unlock our computers. Our computer technology, however, is going the other way. Physical keys – with PIN codes – are proving safer and more convenient in office environments.

In many offices, an administrative assistant or another employee may need to access the email or a website of an employee who is out of the office. Two-factor authentication (2FA) – which should be installed – usually requires access to a second device, such as a cell phone or an email address. If the account owner is not available, 2FA won’t work, unless the system is set up to work with another person’s devices. That gets really complicated, and it can be compromised.

A security key is a much more secure passwordless form of 2FA. The term security key should not be used interchangeably with passkeys, which are another form of passwordless security. Security keys are physical devices that typically work through a USB-C port, but they are not limited to USB-C. They can use USB-A ports and Apple’s Lightning ports.

When you or an authorized user logs in, that person enters your password and then uses the security key, which generates a unique code or signature to confirm your identity. That makes it difficult for unauthorized users to access your account even if they have your password.

Security keys utilize public-key cryptography, making them resistant to phishing and credential theft. They can be used with cell phones, and to be honest, not enough of our clients are setting them up on their phones. They can be more secure in public places.

Security keys work with virtually all password managers, but they need to be supported by website hosts and the cloud providers they use, such as AWS. That support is getting stronger as many services now recognize their importance for enhancing online security. Security keys are compatible with various platforms and applications, providing reliable authentication without the risks associated with cloud storage.

Security keys are relatively inexpensive to purchase, but they do require specific setup and customization. We can help you with a comprehensive purchase and deployment program. Call us – 973-433-6676 – or email us to discuss your needs and develop a program.

Microsoft’s Annoyances

A lot of our clients are complaining about Microsoft’s annoying habit of making unannounced changes in features and in how we access what’s left and what we need. We can complain all we want, but this is one case where we just need to bite the bullet and work around various issues.

The biggest annoyances with Microsoft revolve around the New Outlook and the Classic (Old) Outlook. While New Outlook is faster and has some really good message management features, it doesn’t handle attachments as well as its “classic” version.

One of our clients receives .csv files as attachments from their bank. They can’t open them in New Outlook. The only solution is to toggle back to Classic Outlook to download the files and then toggle back. It’s an extra step I find having to use myself, and it doesn’t make me happy.

Other missing features cited in discussion groups and various articles are editing and writing features that used Word, especially for shortcuts; dozens of message handling options; calendar editing options, especially not having Word for editing; lack of print options in Mail view; using Outlook without a mouse; and PST file support.

Microsoft acknowledges that many features are missing and claims to be working on them, but our feeling is that they won’t do anything that will take a lot of time and money. My own feeling is that they don’t have engineers talking to people anymore. If you read responses to complaints, they seem like they were generated by bots; there’s little or no empathy for their customers.

Of course, Microsoft is not alone. Other tech companies seem to do what they want when they want, knowing that most of us have few or no alternatives. It seems that workarounds are the only solution to their shortcomings.

Workarounds are where we can help. Call us – 973-433-6676 – or email us and tell us what you’re trying to do with Outlook, Microsoft apps and apps from other software publishers. We’ll work with you to find workarounds that can make you more efficient.

Old Windows, Old Files

Believe it or not, we have some clients who need to keep computers capable of running really old versions of Windows to access equally old files. They need to keep these legacy systems going, and we have ways to help them.

One client still has a system running on Windows XP. Windows XP is 24 years old, yet some people consider it to be one of the best pieces of software ever made by Microsoft, and the best all-round version of Windows. It had a reputation for being a reliable workhorse.

One of the apps it can run is Lotus 1-2-3, a discontinued spreadsheet program from Lotus Software. It was the first killer application for the IBM PC and was hugely popular in the 1980s. Running on DOS, the operating system that preceded Windows, it significantly contributed to the success of IBM PC-compatibles in the business market.

Our client still has Lotus 1-2-3 files, which contain vitally needed information, and a computer with Windows XP. Because the Windows system hasn’t been updated for many years, it needs to be kept offline with a separate firewall so that files can be accessed and printed without jeopardizing the company’s security.

While this is an extreme situation, this client is not alone. We support a number of clients who need to use legacy systems, and our major concerns are preserving their access to files and keeping their systems secure.

Because backward compatibility depends on what files can be read, we do whatever we can to make sure files are backed up. We also set up parallel systems to protect online security for the rest of their technology. The older the legacy system is, the more intricate our solution becomes. For most clients, this involves Excel spreadsheets.

If you have a Windows operating system that’s older than Windows 11, we should be looking at systems to backup files and maximize your access. Technology changes quickly, and the sooner we can get to something, the better the plan we can design and implement to protect your valuable data and access to it.

Call us – 973-433-6676 – or email us to start the conversation. It’s much easier to get everything in order as soon as possible, and that will also help you control your costs.